Enable job alerts via email!

Senior SOC Analyst

Good Job Creations

Singapore

On-site

SGD 96,000 - 120,000

Full time

Today
Be an early applicant

Job summary

A leading cybersecurity firm in Singapore is seeking an experienced professional to design and fine-tune detection rules across various platforms such as SIEM and EDR. The candidate should have at least 8-10 years of experience in SOC environments, strong communication skills, and familiarity with threat detection frameworks. Responsibilities include leading investigations, collaborating with teams, and mentoring junior analysts in a dynamic environment.

Qualifications

  • 8-10+ years in SOC/MSSP environments.
  • Hands-on experience with SOAR platforms, malware analysis, and scripting.
  • Strong grasp of cyber TTPs and frameworks.

Responsibilities

  • Design and optimize detection rules across various platforms.
  • Collaborate with teams to validate detection strategies.
  • Lead end-to-end investigations during security incidents.

Skills

SIEM expertise (Splunk, QRadar, Sentinel, Devo)
EDR expertise (CrowdStrike, Defender)
Scripting skills (shell, Python)
Threat detection knowledge
Excellent communication skills

Education

SANS certification (e.g., GCIH)

Tools

SOAR platforms
Cloud platforms (AWS, Azure, GCP)
Network security tools
Job description
What You’ll Do
  • Design and fine‑tune high‑fidelity detection rules across SIEMs (Splunk, Sentinel, Devo, QRadar) and EDR platforms.
  • Build custom use cases based on MITRE ATT&CK and red‑team insights.
  • Eliminate false positives, improve alert accuracy, and continuously optimize detection logic.
  • Collaborate with red/purple teams to validate and evolve detection strategies.
  • Proactively hunt for threats across hybrid environments using telemetry from SIEM, EDR, and NDR tools.
  • Leverage threat intelligence and frameworks (MITRE, Diamond Model) to build and execute targeted hunting campaigns.
  • Analyze and operationalize threat intel to inform detection rules and incident response.
  • Lead end‑to‑end investigations—from triage to recovery—during security incidents.
  • Conduct forensic analysis and produce detailed reports with root cause and mitigation plans.
  • Develop playbooks, runbooks, and coordinate across teams and clients during major events.
  • Mentor junior analysts and contribute to process automation and SOP development.
  • Engage with customers through regular reviews, briefings, and incident updates.
  • Drive continuous improvement through lessons learned, threat trends, and feedback loops.
Requirements
  • 8–10+ years in SOC/MSSP environments with deep SIEM (Splunk, QRadar, Sentinel, Devo) and EDR (CrowdStrike, Defender) expertise.
  • Hands‑on experience with SOAR platforms, malware analysis, scripting (shell, Python), and basic Unix/Linux troubleshooting.
  • Strong grasp of threat detection, cyber TTPs, and frameworks like MITRE ATT&CK.
  • Excellent communication skills and the ability to lead cross‑functional collaboration.
  • SANS certification (e.g., GCIH) strongly preferred.
Bonus Points For
  • Experience with threat hunting, vulnerability assessments, or DFIR.
  • Familiarity with cloud platforms (AWS, Azure, GCP) and network security tools.
  • Exposure to threat intel platforms like MISP.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.